Collection of Offensive C# Tooling
☆13Nov 4, 2021Updated 4 years ago
Alternatives and similar repositories for OffensiveCSharp
Users that are interested in OffensiveCSharp are comparing it to the libraries listed below
Sorting:
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- ☆12Jun 2, 2021Updated 4 years ago
- Download a .NET payload and run it on memory☆70Apr 12, 2019Updated 6 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆44Sep 22, 2019Updated 6 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 weeks ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- ☆33Jan 23, 2025Updated last year
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 8 months ago
- Bypass AMSI by patching AmsiScanBuffer☆282Jun 4, 2021Updated 4 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- ☆299Mar 31, 2022Updated 3 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆118Jun 7, 2023Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 6 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Public exploits☆16May 28, 2018Updated 7 years ago